ARTICLES

All About the Lastest Mandrake Spyware

Recently, a security firm uncovered the Mandrake spyware. Read on to know more about it... A cybersecurity research team has uncovered the Mandrake spying operation...

How Hackers Exploit Smartphones & Apps through Backdoor Secrets

According to a recent study, hackers are exploiting smartphone vulnerabilities through Backdoor Secrets. Read on to know more... According to a study that may lead...

Knowing the Security Vulnerabilities of Zoom App

Video conferencing app Zoom, in the coronavirus pandemic is an indispensable tool. However it's privacy and security issues is a serious concern. Read on...

How Zeus Sphinx Banking Trojan Uses COVID-19 Incident for Phishing Scam

The Zeus Sphinx Banking Trojan returns from the dead in new COVID-19 baiting phishing scam. Read on to know more... The recent months have created...

NEWS

Increase in Remote Working and Coronavirus Related Threats

Increase in Remote Working and Coronavirus Related Threats Creating Perfect Storm of Security Challenges for Organisations, New Survey Finds Check Point Software & Dimensional Research's...

Data security experts red flag Zoom app

Source: TNN Data security researchers claim there are huge security and privacy concerns in video conferencing app Zoom. Citizens Lab, which had earlier exposed lacunae...

“MakeFrame” Skimmer Targets E-commerce Businesses in New Campaign

Source: Cyware Hacker News • The campaign has successfully compromised at least 19 different e-commerce websites so far. • Experts said the threat group also used...

Most firms see rise in cyberattacks during pandemic – Survey

Source: IANS As organisations are prepping for smooth workflows, cybercriminals capitalise on latest trends to boost the success rates of attacks. Most organisations have seen a...

INTERVIEWS

Understanding The Function of World’s First AI Powered AST Solution

We recently met Mr. Oliver Moradov, Head of Partnerships at NeuraLegion, an Israeli headquartered company with a London office, which has recently innovated a...

Interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security

In an exclusive interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security at Cybertech Israel 2019, shares his view on IBM's implementation of...

Interview of Paul Garvey, Vice President of IBM Security, Asia Pacific

In this interview, Paul Garvey, Vice President of IBM Security, Asia Pacific, explains how IBM is gearing up to meet the security challenges and...

Interview with Alisdair Faulkner, Chief Products Officer, ThreatMetrix, U.S

Alisdair Faulkner, Chief Products Officer, ThreatMetrix, explains how his organisation secures the digital identity of business and government enterprises through digital identity intelligence and...

Interview of Thiagarajan, Director – IT, India & Asia, IMI Critical...

With the growing threat landscape in cyber space, how matured the critical industry sector is in India to protect their business sensitive data? The critical...

INDUSTRY INPUTS

Why Internet Isolation is the Key to Cyber Security

Isolation of Internet from the corporate network can secure the key digital assets of organization. Read on to know why Internet isolation is the...

Safety Expertise in the Digital Age for Critical Infrastructures

As Industrial plants have become much more complex, we look at some of the critical requirements and safety expertise for critical infrastructures and Industrial...

Significance of Trust in Information Technology

In this brief article, Ticky Thakkar explains the significance of trust in various technologies with respect to security. Trust is defined as “a firm belief...

OPINION Patches, Data and Patient Security

Security and medicine are increasingly intertwined, especially in today's highly regulated world where more people care for privacy and data protection. However, with companies...

Confronting The Automotive Cyber Threat

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world’s leading brands. As...

EVENTS

GISEC 2020 – Event Information

The Gulf Information Security Expo & Conference (GISEC) 2020, event, would be held on 1 - 3 September 2020, from 10am - 6pm, at...

RSA Conference 2020 – San Francisco

RSA Conference 2020 San Francisco | February 24 - 28 | Moscone Center How do busy cybersecurity professionals stay on top of basic frameworks and emerging...

RSA Conference 2019 – Asia Pacific & Japan

RSA Conference 2019 Asia Pacific & Japan Marina Bay Sands | Singapore 16 – 18 July As the region's leading cybersecurity event, RSA Conference 2019 Asia Pacific...